Some basic concepts, such as community and people in a community, need to be reinforced. Students need to understand the difference between a stranger and a trusted adult, in person and in cyber space. At this point, the relationship between a real community and a virtual community should be connected. It should be emphasized that students should always have an adult present while going online and be able to differentiate what it means to feel safe versus unsafe.
Students need to understand that they need to be just as responsible about using the Internet as they would in their own surroundings. Everything they post stays up there forever; whether if it's photographs, emails, blogs or instant messages, they are accountable for what they say and do.
Review Terms Attachment: This is a file that has been added to an e-mail. It could be something like a photograph or a clip of your favorite song. It could be something harmful to your computer, like a virus. Remind children to never open an attachment or e-mail from someone they don't know. Community: the area where we live, with places where we know real people. Cyber Citizen: People who actively participate in a cyber community Cyber Community: a website where we visit, learn, play games, create characters or virtual pets/friends Cyber Smart: Making good, smart choices when in a cyber community Email: A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world. To send someone an e-mail message you need an e-mail account and to know the other person's e-mail address. File: Anything that can be saved on your computer Intellectual Property: refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. Pirates: People who take things that belong to others from the Internet without asking permission. Plagiarism: The act of copying someone's work and claiming it as their own Responsible Cyber Citizen: A person who uses their cyber smarts Spam- Unwanted e-mail from someone you don't know. It is usually trying to sell you something. Trusted Adult: A parent, teacher, or guardian Virus: A computer program that can destroy files or make your computer "crash." Viruses can be sent via e-mail or through other file-sharing programs. Anti-virus software and not downloading information from people you don't know can help keep viruses from damaging your computer.
New Terms AIM: America Online Instant Messenger Buddy List: a list of screen names on an instant message program Chatrooms: Private or public places on the web where people go to chat Cyberbullying: sending or posting harmful or cruel text or images using the internet or other digital communication devices. IM (Instant Message): Instant Messaging is a form of communicating instantaneously with someone else from computer to computer
1. Cyber Community
Concepts
Some types of e-mail are inappropriate e-mails.
Inappropriate e-mails are described briefly as threatening or mean e-mails, hoaxes, scams and SPAM.
Definitions for inappropriate e-mails are described with age-appropriate terminology.
Ways to handle inappropriate e-mail that may be received are described in the following ways:
Don’t open e-mail from people you don’t know.
It’s a good idea to ask for permission from an adult before you open any e-mail.
If an e-mail contains inappropriate materials delete it.
Never reply to SPAM e-mail
Concept introduction: inappropriate websites can be fixed so that responsible cyber citizens cannot get out of them very easily.
Additional strategies to get out of inappropriate websites are described as:
Click the back arrow
If all else fails, turn off the system completely.
Discussion
How is the cyber community different than a schoolyard? Similar?
In what ways can you Use Your Netsmartz in the cyber community?
Not mentioned above: "The Bully Who Looks The Other Way" and does nothing...
Discussion:
What are some signs that someone might be bullying online?
What are some steps you can take if you notice someone bullying?
Activities: Review the 4 types of online bullies. Assign students into small groups and have them role play a scene where they can identify one of the 4 types of bullies mentioned above. Have the other students guess which bully scenario they are trying to role play. It might be helpful to print out the activity and cut them up into activity cards to handout. Discuss steps they can take to avoid cyberbullying. This is a great activity to repeat and discuss more than once.
Grade 4
Table of Contents
The Big Idea
Some basic concepts, such as community and people in a community, need to be reinforced. Students need to understand the difference between a stranger and a trusted adult, in person and in cyber space. At this point, the relationship between a real community and a virtual community should be connected. It should be emphasized that students should always have an adult present while going online and be able to differentiate what it means to feel safe versus unsafe.Students need to understand that they need to be just as responsible about using the Internet as they would in their own surroundings. Everything they post stays up there forever; whether if it's photographs, emails, blogs or instant messages, they are accountable for what they say and do.
Review Terms
Attachment: This is a file that has been added to an e-mail. It could be something like a photograph or a clip of your favorite song. It could be something harmful to your computer, like a virus. Remind children to never open an attachment or e-mail from someone they don't know.
Community: the area where we live, with places where we know real people.
Cyber Citizen: People who actively participate in a cyber community
Cyber Community: a website where we visit, learn, play games, create characters or virtual pets/friends
Cyber Smart: Making good, smart choices when in a cyber community
Email: A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world. To send someone an e-mail message you need an e-mail account and to know the other person's e-mail address.
File: Anything that can be saved on your computer
Intellectual Property: refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.
Pirates: People who take things that belong to others from the Internet without asking permission.
Plagiarism: The act of copying someone's work and claiming it as their own
Responsible Cyber Citizen: A person who uses their cyber smarts
Spam- Unwanted e-mail from someone you don't know. It is usually trying to sell you something.
Trusted Adult: A parent, teacher, or guardian
Virus: A computer program that can destroy files or make your computer "crash." Viruses can be sent via e-mail or through other file-sharing programs. Anti-virus software and not downloading information from people you don't know can help keep viruses from damaging your computer.
New Terms
AIM: America Online Instant Messenger
Buddy List: a list of screen names on an instant message program
Chatrooms: Private or public places on the web where people go to chat
Cyberbullying: sending or posting harmful or cruel text or images using the internet or other digital communication devices.
IM (Instant Message): Instant Messaging is a form of communicating instantaneously with someone else from computer to computer
1. Cyber Community
ConceptsDiscussion
Activity: The Boy Who Loved IM(Scroll down and download the lesson plan for grade 4)
Video: The Boy Who Loved IM
2. Personal Safety
ConceptsDiscussion:
Activity:Know The Rules- Check First(Scroll down and download the lesson plan for grade 4)
Video: Know the Rules Rap Video
3. Cyber Security
Concepts
Activity: The Password Rap 1(Scroll down and download the lesson plan for grade 4)
Activity: The Password Rap 2(Scroll down and download the lesson plan for grade 4)
Activity: The Password Rap 3(Scroll down and download the lesson plan for grade 4)
Video: The Password Rap
4. Intellectual Property
Concepts:Video: Clicky's Stolen Song: A Lesson in Digital Ethics (12 min)
Discussion:
5. Cyberbullying
ConceptsThere are 4 types of online bullies:
Not mentioned above: "The Bully Who Looks The Other Way" and does nothing...
Discussion:
Activities: Review the 4 types of online bullies. Assign students into small groups and have them role play a scene where they can identify one of the 4 types of bullies mentioned above. Have the other students guess which bully scenario they are trying to role play. It might be helpful to print out the activity and cut them up into activity cards to handout. Discuss steps they can take to avoid cyberbullying. This is a great activity to repeat and discuss more than once.